Feature Suggestion | List PGP keys + proofs of recommendations somewhere? #1755

Open
opened 2020-03-03 15:29:25 +00:00 by Mikaela · 1 comment
Mikaela commented 2020-03-03 15:29:25 +00:00 (Migrated from github.com)

Description

A bit like https://github.com/privacytoolsIO/privacytools.io/issues/1622, we have multiple recommendations who are using PGP in code/software signing, sign emails they send or support PGP encrypted emails. https://github.com/privacytoolsIO/privacytools.io/issues/1703 would bring more of them, so I wonder if we should have a list of the PGP fingerprints (with a big warning to not solely trust us and do your own research)?

I think this might carry a risk of us becoming a pseudo CA though, while git makes all changes transparent (at least for those who look).

As with #1622, I have a personal "project" doing similar except that I am not bothering with proofs there. README

## Description A bit like https://github.com/privacytoolsIO/privacytools.io/issues/1622, we have multiple recommendations who are using PGP in code/software signing, sign emails they send or support PGP encrypted emails. https://github.com/privacytoolsIO/privacytools.io/issues/1703 would bring more of them, so I wonder if we should have a list of the PGP fingerprints (with a big warning to not solely trust us and do your own research)? I think this might carry a risk of us becoming a pseudo CA though, while git makes all changes transparent (at least for those who look). *As with #1622, [I have a personal "project" doing similar](https://gitea.blesmrt.net/mikaela/pgp-alt-wot/) except that I am not bothering with proofs there. [README](https://gitea.blesmrt.net/mikaela/pgp-alt-wot/src/branch/master/README.md)*

I think this might carry a risk of us becoming a pseudo CA though

This is my concern, especially because we will now be tasked with keeping it up to date with changes as well. If a project utilizes PGP they should also have a mechanism to securely transmit that key to the user on their own, IMO.

> I think this might carry a risk of us becoming a pseudo CA though This is my concern, especially because we will now be tasked with keeping it up to date with changes as well. If a project utilizes PGP they should also have a mechanism to securely transmit that key to the user on their own, IMO.
This repo is archived. You cannot comment on issues.
No Milestone
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: privacyguides/privacytools.io#1755
No description provided.